Gihwan Cho

ORCID: 0000-0003-4923-8565
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • IPv6, Mobility, Handover, Networks, Security
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Harvesting in Wireless Networks
  • Network Traffic and Congestion Control
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Context-Aware Activity Recognition Systems
  • Cloud Data Security Solutions
  • Wireless Communication Networks Research
  • Cooperative Communication and Network Coding
  • Wireless Networks and Protocols
  • Underwater Vehicles and Communication Systems
  • Mobile Agent-Based Network Management
  • Internet of Things and Social Network Interactions
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Body Area Networks

Samsung (South Korea)
2025

Jeonbuk National University
2013-2023

Chonbuk National University Hospital
2010-2022

Sungkyunkwan University
2021-2022

Korea Institute of Science & Technology Information
2013

University of Newcastle Australia
2005

The growing demand for human-independent comfortable lifestyle has emboldened the development of smart home. A typical keenly intellective home includes many Internet things contrivances that engender processes and immensely colossal data to efficiently handle its users’ demands. This incrementing raises a plethora concern cognate system in terms scalability, efficiency, security. All these issues are tedious manage, existing studies lack granularity surmounting them. Considering such...

10.1177/1550147719844159 article EN cc-by International Journal of Distributed Sensor Networks 2019-04-01

Predicting the time, location and magnitude of an earthquake is a challenging job as does not show specific patterns resulting in inaccurate predictions. Techniques based on Artificial Intelligence (AI) are well known for their capability to find hidden data. In case prediction, these models also produce promising outcome. This work systematically explores contributions made date prediction using AI-based techniques. A total 84 scientific research papers, which reported use techniques have...

10.1109/access.2020.3029859 article EN cc-by IEEE Access 2020-01-01

The Internet of Things (IoT) integrates billions self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience many applications including healthcare, agriculture, supply chain, education, transportation traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one most complicated issues on IoT. Implementing measures,...

10.32604/cmc.2021.018466 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

In this paper, a proper concept of kind photonic crystal fiber known as D-shaped PCF sensor based on SPR or Surface Plasmon Resonance phenomenon has been discussed. The analysis performed numerically using FEM Finite Element Method and PML (Perfectly Matched Layer) boundary conditions. Modal keeping the smallest mesh possible. main mechanism is interaction between core guided light beam metal layer surface that generates free electrons. proposed shows refractive index detection range...

10.1016/j.rinp.2020.103281 article EN cc-by-nc-nd Results in Physics 2020-08-02

Blockchain is attracting more and attention to its applicability in the fields of Internet Things (IoT). In particular, it able store data unalterable blocks, associated with secure peer-to-peer a growing problem transaction authorization industrial service provisioning applications. Moreover, facilitates decentralized (TX) validation distributed ledger. The underneath algorithm TX selection for may not be effective terms delay various services Because existing random-based or fee-based...

10.1109/access.2020.3004486 article EN cc-by IEEE Access 2020-01-01

The IPv6 routing protocol for low power and lossy networks (RPL) was designed to satisfy the requirements of a wide range Internet Things (IoT) applications, including industrial environmental monitoring. In most scenarios, different from an ordinary environment, monitoring system under emergency scenarios needs not only periodically collect information sensing region, but also respond rapidly some unusual situations. system, particularly when event occurs in surge data generated by sensors...

10.3390/s18113838 article EN cc-by Sensors 2018-11-09

Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach elect cluster heads take routing and controlling duty, periodically rotate each head's role distribute energy consumption among nodes. However, significant amount dissipates due control messages overhead, which results in shorter lifetime. This paper proposes energy-centric cluster-based mechanism WSNs. To begin with, are elected based on higher ranks rank defined by residual...

10.3390/s18051520 article EN cc-by Sensors 2018-05-11

The rapid development of the Internet Things (IoT) concept has promoted presence routing protocol for low power and lossy network (RPL). Unlike traditional applications, many applications envisioned IoT networks may have different sometimes conflicting requirements. In this context, underlying requires to provide quality service (QoS) multipurpose is inevitable. However, approach in RPL not efficient because default objective functions (OFs) rely on a single metric, which can result tradeoff...

10.1109/access.2020.2995794 article EN cc-by IEEE Access 2020-01-01

The emergence of an array new wireless networks has led researchers to evaluate the prospect utilizing physical properties medium in order design secure systems. In this paper, layer secrecy performance a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is investigated presence eavesdropper. We assume that eavesdropper can wiretap transmitted confidential data from RF link only. It further assumed main and links are modeled as generalized Gamma (GG)...

10.1109/access.2020.2998742 article EN cc-by IEEE Access 2020-01-01

In this paper, an asymmetric photonic crystal fiber (PCF) working on surface plasmon resonance (SPR) has been proposed and demonstrated using the wavelength interrogation method lower birefringence peak method. The sensor contains a D-shaped analyte channel that can detect unknown analytes within sensing range of 1.42–1.47 refractive index units (RIU) analytes. structural asymmetry induces orthogonal x y polarization modes. numerical investigations with finite element (FEM) reveal maximum...

10.1016/j.rinp.2020.103372 article EN cc-by Results in Physics 2020-09-03

Data/tasks of Industrial Internet Things (IIoT) are extremely private and valuable to computing. Edge computing facilitates IIoT services by offering platforms supportive facilities functionalities. However, the convergence intelligent edge has been held back need develop systems for maintaining security privacy. In this article, we propose a new framework securely confidentially sending, storing, tasks. This employs lightweight encryption scheme alongside modified ElGamal digital signature...

10.1109/tii.2021.3123260 article EN IEEE Transactions on Industrial Informatics 2021-10-27

In this work, we examine the privacy and safety issues of Internet Things (IoT)-based Precision Agriculture (PA), which could lead to problem that industry is currently experiencing as a result Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make system less secure if proper security mechanism not ensured. Shortly, IoT transform everyday lives with its applications. (IP) another important concept an intelligent farming system. If IP wise leaks, it damages...

10.3390/electronics10161987 article EN Electronics 2021-08-18

Industry 4.0 refers to the fourth evolution of technology development, which strives connect people various industries in terms achieving their expected outcomes efficiently. However, resource management an network is very complex and challenging. To manage provide suitable resources each service, we propose a FogQSYM (Fog–-Queuing system) model; it analytical model for Fog Applications that helps divide application into several layers, then enables sharing effective way according...

10.32604/cmc.2021.017302 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Internet of Things (IoT) is expected to have a significant impact on city’s service provisioning and make smart city more accessible pragmatic since the deployment heterogeneous devices in each infrastructure cities increasing. So far, IPv6 routing protocol for low power lossy networks (RPL) considered fit IoT achieving network requirements. While RPL meets requirements quite well, there are some issues that need be addressed, such as adaptability dynamics. This issue significantly limits...

10.3390/electronics8091023 article EN Electronics 2019-09-12

Improving quality of service (QoS) low power and lossy networks (LLNs) in Internet things (IoT) is a major challenge. Cluster-based routing technique an effective approach to achieve this goal. This paper proposes QoS-aware clustering-based (QACR) mechanism for LLNs Fog-enabled IoT which provides clustering, cluster head (CH) election, path selection technique. The clustering adopts the community detection algorithm that partitions network into clusters with available nodes' connectivity. CH...

10.1109/tnsm.2019.2946428 article EN cc-by IEEE Transactions on Network and Service Management 2019-10-10

The green industrial Internet of things (IIoT) is emerging as a new paradigm, which envisions the concept connecting different devices and reducing energy consumption. In multi-hop low power lossy network, resource-constrained node should aware its consumption while routing data packets. As part IoT, protocol for network (RPL) considered to be default standard. Recently, RPL has gained significant maturity, but still, optimization one main issues, because objective function (OF), makes...

10.3390/su12187358 article EN Sustainability 2020-09-08

An intelligent vehicle safety system can be constructed by exchanging emergency-related information between any unrelated vehicles, such as urgency stop, traffic accident, and obstacles. In the most of communication applications, an emergency message is propagated in form broadcasting. However, it causes a lot problems terms efficiency due to multi-hop propagation radio collision problems. This paper presents selective forwarding method assigning defer time based on number common neighbors....

10.1109/ichit.2006.37 article EN International Conference on Hybrid Information Technology 2006-11-09

This paper deals with detecting an anomalous traffic area based on its distribution and distance measurements.On such as flooding attack we should consider the packet attribute of traffic.In order to identify that traffic, compute entropy selected Mahalanobis between normal abnormal traffics.Chi-square test is used evaluate proposed method.Detection accuracy performance are analyzed using real network trace which consists mostly backscatter SYN from LANDER project.The result our method...

10.14257/ijsia.2014.8.2.09 article EN International Journal of Security and Its Applications 2014-03-31

10.1007/s13198-019-00861-2 article EN International Journal of Systems Assurance Engineering and Management 2019-09-09

Efficient task and resource allocation techniques are critical to managing the relationships between components of cloud, fog, mist-assisted Internet Things networks. Fulfilling this function necessarily implicates concerns two affected groups, users, who prioritize cost-effectiveness latency, service providers, efficient cost-effective management. While there is no single solution that capable simultaneously wholly optimizing experiences both solutions ensure mutual satisfaction can be...

10.1109/jiot.2021.3090779 article EN IEEE Internet of Things Journal 2021-06-21
Coming Soon ...